共 13 条
- [3] 低功耗蓝牙技术原理与应用[M]. 北京航空航天大学出版社 , 陈灿峰, 2013
- [4] WiSec’ 2011 poster: security enhancement for bluetooth low energy with Merkle’s puzzle. Heiner Perrey,Osman Ugus,Dirk Westhoff. SIGMOBILE Mobile Computing and Communications Review . 2011
- [5] Analyzing the Secure Simple Pairing in Bluetooth v4.0[J] . Raphael Phan,Patrick Mingard.  Wireless Personal Communications . 2012 (4)
- [6] Security Manager - Key to Restrict the Attacks in Bluetooth[J] . Pushpa Suri,Sona Rani.  Journal of Computer Science . 2007 (7)
- [7] Bluetooth:with low energy comes low security. Mike Ryan. Proceedings of the7th USENIX conference on Offensive Technologies . 2013
- [8] Guide to bluetooth security. Padgette J,Scarfone K,Chen L. NIST Special Publication . 2012
- [9] Specification of the bluetooth system corepackage version 4.0. Bluetooth SIG. http://www.bluetooth.com . 2010
- [10] Security vulnerabilities in hybrid flow-specific traffic-adaptive medium access control. Walker III T O,Tummala M,Mc Eachen J. Proc of the 45th Hawaii International Conference on System Sciences . 2012